


default search action
STM 2011: Copenhagen, Denmark
- Catherine Meadows, M. Carmen Fernández Gago

:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 - Bjørnar Solhaug, Ketil Stølen:

Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. 1-5 - Audun Jøsang

:
Trust Extortion on the Internet. 6-21 - Carsten Rudolph

:
Trust Areas: A Security Paradigm for the Future Internet. 22-27 - Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs

, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. 28-39 - Jamie Morgenstern, Deepak Garg, Frank Pfenning:

A Proof-Carrying File System with Revocable and Use-Once Certificates. 40-55 - Valerio Genovese, Deepak Garg:

New Modalities for Access Control Logics: Permission, Control and Ratification. 56-71 - Neyire Deniz Sarier

:
Security Notions of Biometric Remote Authentication Revisited. 72-89 - Sascha Müller, Stefan Katzenbeisser:

Hiding the Policy in Cryptographic Access Control. 90-105 - Klaus Rechert, Benjamin Greschbach:

Location Privacy in Relation to Trusted Peers. 106-121 - Wojciech Jamroga

, Sjouke Mauw
, Matthijs Melissen:
Fairness in Non-Repudiation Protocols. 122-139 - Liang Chen, Jason Crampton:

Risk-Aware Role-Based Access Control. 140-156 - Alessandro Armando

, Silvio Ranise
:
Automated Analysis of Infinite State Workflows with Access Control Policies. 157-174 - Henrich Christopher Pöhls, Focke Höhne:

The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. 175-192 - Ulrich Greveler, Benjamin Justus, Dennis Löhr:

Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms. 193-206 - Pablo Najera, Rodrigo Roman, Javier López

:
Secure Architecure for the Integration of RFID and Sensors in Personal Networks. 207-222 - Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith:

Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. 223-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














